On January 14, 2025, Fortinet announced a critical vulnerability impacting its FortiOS and FortiProxy systems, CVE-2024-55591 is an authentication  bypass zero-day vulnerability that has been actively exploited since mid-November 2024, enabling attackers to hijack Fortinet firewalls and compromise enterprise networks. Successful exploitation grants remote attackers super-admin privileges via malicious requests to the Node.js websocket module.

Discovery and Response 

Fortinet and cybersecurity firm Arctic Wolf jointly identified this campaign, which involves unauthorized administrative access, creation of rogue accounts, and configuration changes. Exploited devices have exhibited activity such as new admin and local users added to VPN groups, changes to firewall policies, and SSL VPN tunneling through rogue accounts.

Fortinet has issued mitigation guidance, including disabling the HTTP/HTTPS administrative interface or restricting access to trusted IPs via local-in policies. Arctic Wolf highlighted that the attacks involved a rapid sequence of phases, starting with vulnerability scanning in November 2024 and culminating in lateral movement by late December 2024. 

CVE-2024-55591 Impact 

Exploitation of this zero-day vulnerability involves remote authentication bypass, enabling  attackers to escalate privileges to super-admin. Compromised devices have been used for  account creation, policy manipulation, and VPN tunneling, with significant risk of  lateral movement across networks.

Fortinet and Arctic Wolf identified the following dates for the attack phases:

  • Vulnerability Scanning: November 16–23, 2024  
  • Reconnaissance: November 22–27, 2024  
  • SSL VPN Configuration: December 4–7, 2024  
  • Lateral Movement: December 16–27, 2024  

Affected Versions 

FortiOS  

  • Versions 7.0.0 through 7.0.16  
  • Versions 7.2.0 through 7.2.12  

Recommended fix: 

  • Upgrade to 7.0.17 or above 

FortiProxy  

  • Versions 7.0.0 through 7.0.19  
  • Versions 7.2.0 through 7.2.12 

Recommended fix:

  • Upgrade to 7.2.13 or above

Recommended Actions  

Fortinet advises organizations to:  

  1. Disable HTTP/HTTPS administrative access or restrict access to trusted  IPs using local-in policies.
  2. Monitor logs for unauthorized logins, rogue account creation and unexpected policy changes.  
  3. Ensure firewall management interfaces are not exposed to the Internet.  
  4. Upgrade FortiOS to 7.0.17 or above and FortiProxy to 7.2.13 or above to mitigate CVE-2024-55591.  

Organizations should prioritize securing FortiGate firewalls and related devices to prevent further exploitation of this vulnerability.  For additional information or assistance with mitigation efforts, contact us at [email protected].